vicsanjinez / wazuh-configLinks
Configurations to implement Wazuh
☆12Updated 3 years ago
Alternatives and similar repositories for wazuh-config
Users that are interested in wazuh-config are comparing it to the libraries listed below
Sorting:
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆412Updated 7 months ago
- ☆190Updated last year
- SIEM Cheat Sheet☆77Updated 2 years ago
- ☆219Updated last year
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆84Updated 3 weeks ago
- ☆64Updated 4 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆41Updated 4 years ago
- ☆54Updated 2 years ago
- MISP Playbooks☆222Updated 2 months ago
- Repository resource for threat hunter☆158Updated 7 years ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆719Updated 5 months ago
- A starter pack of resources to help you get started in Detection Engineering.☆178Updated 4 months ago
- Useful resources about phishing email analysis☆86Updated 11 months ago
- practical toolkit for cybersecurity and IT professionals. It features a detailed Linux cheatsheet for incident response☆405Updated 2 years ago
- Welcome to Project KillChain, a comprehensive GitHub repository for Red and Blue Teams. This repository houses tools, scripts, technique…☆111Updated last year
- ☆96Updated this week
- An automated Adversary Emulation lab with terraform and MCP server. Build Caldera techniques and operations assisted with LLMs. Built f…☆204Updated last month
- Some important DFIR Resources☆84Updated 2 years ago
- Pwnspoof repository☆264Updated 2 years ago
- Domain_checker application is the trial/demo version for the new EASM (External Attack Surface Management) system called HydrAttack (hydr…☆189Updated last year
- Wazuh integration TheHive☆41Updated 2 years ago
- CLI tools for forensic investigation of Windows artifacts☆347Updated 5 months ago
- A collection of companies that disclose adversary TTPs after they have been breached☆291Updated 2 months ago
- A list of Splunk queries that I've collected and used over time.☆89Updated 5 years ago
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆232Updated 3 months ago
- CTF styled Digital Forensics labs, as offered in FAST NUCES Karachi during Spring 2023.☆318Updated 2 years ago
- This is the One Stop place where you can find almost all of your Tools of Requirements in DFIR☆85Updated 3 years ago
- Getting FREE Cyber Security Resources have been a challenge always. Access Davy-Jones-Locker to get all what you might need to upskill yo…☆62Updated 4 years ago
- CTI Blueprints is a free suite of templates and tools that helps Cyber Threat Intelligence analysts create high-quality, actionable repor…☆276Updated 9 months ago
- Tools for simulating threats☆199Updated 2 years ago